首页 > 最新文献

2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI)最新文献

英文 中文
Features-Level Fusion of accumulated Edge Magnitudes Images in Finger-Knuckle-Print authentification 指关节指纹认证中累积边缘幅值的特征级融合
Pub Date : 2021-09-21 DOI: 10.1109/ICRAMI52622.2021.9585922
Seghier Imene, Mourad Chaa, Chebbara Fouad, Abdullah Meraoumia
These days, new technological solutions are gradually being implemented to fight against identity theft, document fraud, cybercrime, and threats from terrorism. Among these technologies, biometrics quickly emerged as the most relevant to identify and authenticate personnel reliably and quickly, based on unique biological characteristics. This paper presents a novel and efficient scheme to extract features for Finger-Knuckle-Print (FKP) recognition. First, the Accumulated Edge Magnitudes Images (AEMI) has been extracted from each ROI FKP image. Then, Gabor Filter bank is utilized to extract features from these AEMIs images. The extracted features from AEMIs images are concatenated to form a large feature vector. Finally, kernel fisher analysis (KFA) is used as a dimensionality reduction technique to build the best feature representant for each FKP image. For matching stage, the cosine distance is used to ascertain the identity of the person. Experimental results using publicly available PolyU FKP dataset show that the presented framework notably attained best performance and outperformed the state-of-the-art techniques.
如今,新的技术解决方案逐渐被用于打击身份盗窃、文件欺诈、网络犯罪和恐怖主义威胁。在这些技术中,基于独特的生物特征,生物识别技术迅速成为可靠、快速地识别和认证人员的最相关技术。提出了一种新颖、高效的指纹特征提取方法。首先,从每个ROI FKP图像中提取累积边缘幅值图像(AEMI)。然后,利用Gabor滤波器组从这些AEMIs图像中提取特征。从AEMIs图像中提取的特征进行拼接,形成一个大的特征向量。最后,使用核费雪分析(KFA)作为降维技术,为每个FKP图像构建最佳特征表示。在匹配阶段,使用余弦距离来确定人的身份。使用公开的理大FKP数据集进行的实验结果表明,所提出的框架明显达到最佳性能,并且优于最先进的技术。
{"title":"Features-Level Fusion of accumulated Edge Magnitudes Images in Finger-Knuckle-Print authentification","authors":"Seghier Imene, Mourad Chaa, Chebbara Fouad, Abdullah Meraoumia","doi":"10.1109/ICRAMI52622.2021.9585922","DOIUrl":"https://doi.org/10.1109/ICRAMI52622.2021.9585922","url":null,"abstract":"These days, new technological solutions are gradually being implemented to fight against identity theft, document fraud, cybercrime, and threats from terrorism. Among these technologies, biometrics quickly emerged as the most relevant to identify and authenticate personnel reliably and quickly, based on unique biological characteristics. This paper presents a novel and efficient scheme to extract features for Finger-Knuckle-Print (FKP) recognition. First, the Accumulated Edge Magnitudes Images (AEMI) has been extracted from each ROI FKP image. Then, Gabor Filter bank is utilized to extract features from these AEMIs images. The extracted features from AEMIs images are concatenated to form a large feature vector. Finally, kernel fisher analysis (KFA) is used as a dimensionality reduction technique to build the best feature representant for each FKP image. For matching stage, the cosine distance is used to ascertain the identity of the person. Experimental results using publicly available PolyU FKP dataset show that the presented framework notably attained best performance and outperformed the state-of-the-art techniques.","PeriodicalId":440750,"journal":{"name":"2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129009087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Impact of Sybil Attacks on Vehicular Fog Networks Sybil攻击对车载雾网络的影响
Pub Date : 2021-09-21 DOI: 10.1109/ICRAMI52622.2021.9585965
Sarra Benadla, Omar Rafik Merad-Boudia
The Internet of Vehicles (IoV) is a network that considers vehicles as intelligent machines. They interact and communicate with each other to improve the performance and safety of traffic. IoV solves certain problems, but it has some issues such as response time, which prompted researchers to propose the integration of Fog Computing into vehicular networks. In Vehicular Fog Computing (VFC), the services are provided at the edge of the network to increase data rate and reduce response time. However, in order to satisfy network users, the security and privacy of sensitive data should be guaranteed. Using pseudonyms instead of real identities is one of the techniques considered to preserve the privacy of users, however, this can push malicious vehicles to exploit such a process and launch the Sybil attack by creating several pseudonyms in order to perform various malicious activities. In this paper, we describe the Sybil attack effects on VFC networks and compare them to those in conventional networks, as well as identify the various existing methods for detecting this attack and determine if they are applicable to VFC networks.
车联网(IoV)是将车辆视为智能机器的网络。它们相互作用和沟通,以提高交通的性能和安全性。车联网解决了某些问题,但也存在响应时间等问题,这促使研究人员提出将雾计算集成到车联网中。在车载雾计算(VFC)中,服务在网络边缘提供,以提高数据速率和缩短响应时间。但是,为了满足网络用户的需求,需要保证敏感数据的安全性和隐私性。使用假名而不是真实身份是保护用户隐私的技术之一,然而,这可能会促使恶意车辆利用这一过程,并通过创建多个假名来发起Sybil攻击,以执行各种恶意活动。在本文中,我们描述了Sybil攻击对VFC网络的影响,并将其与传统网络中的攻击进行了比较,并识别了现有的各种检测这种攻击的方法,并确定它们是否适用于VFC网络。
{"title":"The Impact of Sybil Attacks on Vehicular Fog Networks","authors":"Sarra Benadla, Omar Rafik Merad-Boudia","doi":"10.1109/ICRAMI52622.2021.9585965","DOIUrl":"https://doi.org/10.1109/ICRAMI52622.2021.9585965","url":null,"abstract":"The Internet of Vehicles (IoV) is a network that considers vehicles as intelligent machines. They interact and communicate with each other to improve the performance and safety of traffic. IoV solves certain problems, but it has some issues such as response time, which prompted researchers to propose the integration of Fog Computing into vehicular networks. In Vehicular Fog Computing (VFC), the services are provided at the edge of the network to increase data rate and reduce response time. However, in order to satisfy network users, the security and privacy of sensitive data should be guaranteed. Using pseudonyms instead of real identities is one of the techniques considered to preserve the privacy of users, however, this can push malicious vehicles to exploit such a process and launch the Sybil attack by creating several pseudonyms in order to perform various malicious activities. In this paper, we describe the Sybil attack effects on VFC networks and compare them to those in conventional networks, as well as identify the various existing methods for detecting this attack and determine if they are applicable to VFC networks.","PeriodicalId":440750,"journal":{"name":"2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132016502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Hierarchical Prototype-Based Approach for Osteoporosis Classification 一种基于分层原型的骨质疏松分类方法
Pub Date : 2021-09-21 DOI: 10.1109/ICRAMI52622.2021.9585919
Mebarkia Meriem, Meraoumia Abdallah, Houam Lotfi, Khemaissia Seddik
The widespread use of medical imaging by doctors has made computers a necessity for imaging and analysis. Several clinical decision-making tools have been developed to assess osteoporosis risk through bone density measurement and/or bone image analysis. The purpose of this study is to develop a hierarchical prototype-based approach for classification of osteoporosis. This approach allows you to interactively recognize the multimodal distribution and data space of different levels of data streaming, where you also identify meaningful prototypes for self-organization and self-development hierarchies. The decision-making process is based on the "closest prototype" principle and is clear. The proposed method allows users to present the information retrieved from the data in a hierarchical and easily interpretable form based on a prototype, and is an attractive tool for solving large and complex problems in the real world.
医生对医学成像的广泛使用使得计算机成为成像和分析的必需品。已经开发了几种临床决策工具,通过骨密度测量和/或骨图像分析来评估骨质疏松症的风险。本研究的目的是开发一种基于分层原型的骨质疏松症分类方法。这种方法允许您以交互方式识别不同级别数据流的多模态分布和数据空间,您还可以在其中识别自组织和自开发层次结构的有意义的原型。决策过程以“最接近原型”原则为基础,清晰明了。该方法允许用户以基于原型的分层和易于解释的形式表示从数据中检索到的信息,是解决现实世界中大型和复杂问题的有吸引力的工具。
{"title":"A Hierarchical Prototype-Based Approach for Osteoporosis Classification","authors":"Mebarkia Meriem, Meraoumia Abdallah, Houam Lotfi, Khemaissia Seddik","doi":"10.1109/ICRAMI52622.2021.9585919","DOIUrl":"https://doi.org/10.1109/ICRAMI52622.2021.9585919","url":null,"abstract":"The widespread use of medical imaging by doctors has made computers a necessity for imaging and analysis. Several clinical decision-making tools have been developed to assess osteoporosis risk through bone density measurement and/or bone image analysis. The purpose of this study is to develop a hierarchical prototype-based approach for classification of osteoporosis. This approach allows you to interactively recognize the multimodal distribution and data space of different levels of data streaming, where you also identify meaningful prototypes for self-organization and self-development hierarchies. The decision-making process is based on the \"closest prototype\" principle and is clear. The proposed method allows users to present the information retrieved from the data in a hierarchical and easily interpretable form based on a prototype, and is an attractive tool for solving large and complex problems in the real world.","PeriodicalId":440750,"journal":{"name":"2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132098131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Global Existence, Asymptotic Stability and Numerical Simulation for Reaction-Diffusion Systems with Exponential Nonlinearity on Growing Domains 生长域上指数非线性反应-扩散系统的整体存在性、渐近稳定性及数值模拟
Pub Date : 2021-09-21 DOI: 10.1109/ICRAMI52622.2021.9585915
Redouane Douaifia, S. Abdelmalek, B. Rebiai
This paper primarily seeks to extend the results of Rebiai and Benachour [10] on the global existence, uniqueness, uniform boundedness, and the asymptotic behavior of solutions for a weakly coupled reaction-diffusion systems with exponential nonlinearity on a growing domain with an isotropic growth, the desired results are obtained by using Lyapunov functions’ method. The theoretical findings are supported and affirmed by numerical simulation.
本文在各向异性增长区域上推广了Rebiai和Benachour[10]关于指数非线性弱耦合反应扩散系统解的整体存在性、唯一性、一致有界性和渐近性的结果,并利用Lyapunov函数方法得到了预期结果。数值模拟结果支持和肯定了理论研究结果。
{"title":"Global Existence, Asymptotic Stability and Numerical Simulation for Reaction-Diffusion Systems with Exponential Nonlinearity on Growing Domains","authors":"Redouane Douaifia, S. Abdelmalek, B. Rebiai","doi":"10.1109/ICRAMI52622.2021.9585915","DOIUrl":"https://doi.org/10.1109/ICRAMI52622.2021.9585915","url":null,"abstract":"This paper primarily seeks to extend the results of Rebiai and Benachour [10] on the global existence, uniqueness, uniform boundedness, and the asymptotic behavior of solutions for a weakly coupled reaction-diffusion systems with exponential nonlinearity on a growing domain with an isotropic growth, the desired results are obtained by using Lyapunov functions’ method. The theoretical findings are supported and affirmed by numerical simulation.","PeriodicalId":440750,"journal":{"name":"2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132516861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Countermeasure Selection Under Blockchain Based Privacy Preserving 基于区块链隐私保护的网络对策选择
Pub Date : 2021-09-21 DOI: 10.1109/ICRAMI52622.2021.9585916
Rofaida Khemaissia, M. Derdour, M. Ferrag, A. Djeddai
Due to the blooming trend of information technologies, attacks have become widespread and sophisticated, which calls to build a strong defense design that works with the attack evolution. The countermeasure selection enables the system to retrieve its health. However, privacy concerns are also introduced in the selection process, which makes the business companies less credible, which affects both users and services. In this paper we propose a dynamic defense framework that allows selecting the optimal countermeasure which brings between the blockchain-based privacy preserving and the countermeasure selection in order to estimate the privacy coverage in the quantitative metric.
随着信息技术的迅猛发展,攻击的范围越来越广,攻击的复杂性也越来越高,这就要求我们建立一个强大的防御设计,以适应攻击的发展。对策选择使系统能够恢复其健康。然而,在选择过程中也引入了隐私问题,这使得商业公司的可信度降低,这对用户和服务都有影响。在本文中,我们提出了一个动态防御框架,允许在基于区块链的隐私保护和对策选择之间选择最优对策,以便在定量度量中估计隐私覆盖范围。
{"title":"Network Countermeasure Selection Under Blockchain Based Privacy Preserving","authors":"Rofaida Khemaissia, M. Derdour, M. Ferrag, A. Djeddai","doi":"10.1109/ICRAMI52622.2021.9585916","DOIUrl":"https://doi.org/10.1109/ICRAMI52622.2021.9585916","url":null,"abstract":"Due to the blooming trend of information technologies, attacks have become widespread and sophisticated, which calls to build a strong defense design that works with the attack evolution. The countermeasure selection enables the system to retrieve its health. However, privacy concerns are also introduced in the selection process, which makes the business companies less credible, which affects both users and services. In this paper we propose a dynamic defense framework that allows selecting the optimal countermeasure which brings between the blockchain-based privacy preserving and the countermeasure selection in order to estimate the privacy coverage in the quantitative metric.","PeriodicalId":440750,"journal":{"name":"2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126497104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Optimized Path Planning for Wheeled Robot in Obstacle Environments 轮式机器人在障碍环境下的路径优化规划
Pub Date : 2021-09-21 DOI: 10.1109/ICRAMI52622.2021.9585978
Mohamed Amine Yakoubi, Djamel Bektache, Abderahmane Gaham, Raouf Toumi
In this work, we have proposed in unknown setting, there is an impediment avoidance for a mobile robot based on the fuzzy logic control. Therefore, the wheeled mobile robot is equipped with 3 wheels, one steering wheel and two fixed wheels and mounted on the same axis. It functions to lift from a starting point to a target position. For this, our proposed algorithm creates one or more imaginary target and applies a fuzzy logic control system, which is adopted by a rule table that is induced from two inputs data (the distance and the angle between the robot and the target) and two outputs data (the angle orientation and velocity of the steer wheel). Experiential outcomes show how effective and functional the suggested algorithm it is.
在这项工作中,我们提出了一种基于模糊逻辑控制的移动机器人在未知环境下的避障方法。因此,轮式移动机器人具有3个轮子、1个方向盘和2个固定轮,安装在同一轴上。它的作用是从起点上升到目标位置。为此,我们提出的算法创建一个或多个虚拟目标,并采用模糊逻辑控制系统,该系统采用由两个输入数据(机器人与目标之间的距离和角度)和两个输出数据(方向盘的角度方向和速度)导出的规则表。经验结果显示了所建议算法的有效性和功能性。
{"title":"An Optimized Path Planning for Wheeled Robot in Obstacle Environments","authors":"Mohamed Amine Yakoubi, Djamel Bektache, Abderahmane Gaham, Raouf Toumi","doi":"10.1109/ICRAMI52622.2021.9585978","DOIUrl":"https://doi.org/10.1109/ICRAMI52622.2021.9585978","url":null,"abstract":"In this work, we have proposed in unknown setting, there is an impediment avoidance for a mobile robot based on the fuzzy logic control. Therefore, the wheeled mobile robot is equipped with 3 wheels, one steering wheel and two fixed wheels and mounted on the same axis. It functions to lift from a starting point to a target position. For this, our proposed algorithm creates one or more imaginary target and applies a fuzzy logic control system, which is adopted by a rule table that is induced from two inputs data (the distance and the angle between the robot and the target) and two outputs data (the angle orientation and velocity of the steer wheel). Experiential outcomes show how effective and functional the suggested algorithm it is.","PeriodicalId":440750,"journal":{"name":"2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126966493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Printed Arabic Characters Recognition Using Combined Features and CNN classifier 结合特征和CNN分类器的印刷阿拉伯字符识别
Pub Date : 2021-09-21 DOI: 10.1109/ICRAMI52622.2021.9585941
Lallouani Bouchakour, Fariza Meziani, H. Latrache, Khadija Ghribi, Mustapha Yahiaoui
In this paper we investigate the optical characters recognition for Arabic language (AOCR). This system is considered as a challenging research topic due to richness and difficulties of Arabic writing. The OCR system incorporates three main stages that are segmentation, feature extraction and recognition. In this work, we have proposed a new method to recognize printed Arabic characters. This method is based on the combined features extraction, which are the densities of black pixels, invariant moments of Hu and Gabor features and the Convolution Neural Network CNN classifier. Experiments are conducted on the Printed Arabic Text set PAT-A01.The result show that the features combination enhances the recognition accuracy rate.
本文对阿拉伯语的光学字符识别进行了研究。由于阿拉伯语写作的丰富性和艰巨性,该系统被认为是一个具有挑战性的研究课题。OCR系统包括三个主要阶段:分割、特征提取和识别。在这项工作中,我们提出了一种新的识别印刷阿拉伯字符的方法。该方法基于黑色像素的密度、Hu和Gabor特征的不变矩以及卷积神经网络CNN分类器的组合特征提取。在阿拉伯语印刷文本集PAT-A01上进行了实验。结果表明,特征组合提高了识别准确率。
{"title":"Printed Arabic Characters Recognition Using Combined Features and CNN classifier","authors":"Lallouani Bouchakour, Fariza Meziani, H. Latrache, Khadija Ghribi, Mustapha Yahiaoui","doi":"10.1109/ICRAMI52622.2021.9585941","DOIUrl":"https://doi.org/10.1109/ICRAMI52622.2021.9585941","url":null,"abstract":"In this paper we investigate the optical characters recognition for Arabic language (AOCR). This system is considered as a challenging research topic due to richness and difficulties of Arabic writing. The OCR system incorporates three main stages that are segmentation, feature extraction and recognition. In this work, we have proposed a new method to recognize printed Arabic characters. This method is based on the combined features extraction, which are the densities of black pixels, invariant moments of Hu and Gabor features and the Convolution Neural Network CNN classifier. Experiments are conducted on the Printed Arabic Text set PAT-A01.The result show that the features combination enhances the recognition accuracy rate.","PeriodicalId":440750,"journal":{"name":"2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129514018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation of MPPT Methods for improving the Performance of Photovoltaic Systems MPPT方法在提高光伏系统性能中的应用
Pub Date : 2021-09-21 DOI: 10.1109/ICRAMI52622.2021.9585933
N. Boutasseta, M. Bouakkaz, I. Attoui, Nadir Fergani, A. Bouraiou, NECAIBIA Ammar
Solar energy represents the main source of renewable power generation. This paper deals with the design of an efficient photovoltaic (PV) solar energy conversion system using maximum power point tracking techniques. Initially, aspects of planning and estimation of the PV systems performance were considered. The optimum operating point of a photovoltaic array is called Maximum Power Point (MPP), which varies depending on the cell temperature and the sun's insulation level. In order to achieve the goal of the Maximum Power Point Tracking (MPPT), three types of algorithms were developed in this work. The first algorithm is based on a neural network approach (ANN) that uses the backpropagation as its training algorithm. The second algorithm is based on fuzzy logic (FL), which uses the properties of the panel for its Maximum Power Point prediction, where the performance depends on the logic of the fuzzy rule. The third method is based on the Hill climbing (HC) algorithm that determines the maximum power point by correlating the changes in power with the changes in the control variable which has the advantage of network independent system and periodic tuning is not required.
太阳能是可再生能源发电的主要来源。利用最大功率点跟踪技术设计了一种高效的光伏太阳能转换系统。最初,考虑了光伏系统性能的规划和估计方面。光伏阵列的最佳工作点被称为最大功率点(MPP),它根据电池温度和太阳的绝缘水平而变化。为了实现最大功率点跟踪(MPPT)的目标,本文开发了三种算法。第一种算法基于神经网络方法(ANN),使用反向传播作为其训练算法。第二种算法基于模糊逻辑(FL),它利用面板的属性进行最大功率点预测,其中性能取决于模糊规则的逻辑。第三种方法是基于Hill climb (HC)算法,通过将功率变化与控制变量的变化相关联来确定最大功率点,该方法具有系统与网络无关的优点,不需要进行周期调谐。
{"title":"Implementation of MPPT Methods for improving the Performance of Photovoltaic Systems","authors":"N. Boutasseta, M. Bouakkaz, I. Attoui, Nadir Fergani, A. Bouraiou, NECAIBIA Ammar","doi":"10.1109/ICRAMI52622.2021.9585933","DOIUrl":"https://doi.org/10.1109/ICRAMI52622.2021.9585933","url":null,"abstract":"Solar energy represents the main source of renewable power generation. This paper deals with the design of an efficient photovoltaic (PV) solar energy conversion system using maximum power point tracking techniques. Initially, aspects of planning and estimation of the PV systems performance were considered. The optimum operating point of a photovoltaic array is called Maximum Power Point (MPP), which varies depending on the cell temperature and the sun's insulation level. In order to achieve the goal of the Maximum Power Point Tracking (MPPT), three types of algorithms were developed in this work. The first algorithm is based on a neural network approach (ANN) that uses the backpropagation as its training algorithm. The second algorithm is based on fuzzy logic (FL), which uses the properties of the panel for its Maximum Power Point prediction, where the performance depends on the logic of the fuzzy rule. The third method is based on the Hill climbing (HC) algorithm that determines the maximum power point by correlating the changes in power with the changes in the control variable which has the advantage of network independent system and periodic tuning is not required.","PeriodicalId":440750,"journal":{"name":"2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115535623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Collaborative Visualization and Annotations of DICOM Images for Real-Time Web-based Telemedicine System 基于web的实时远程医疗系统中DICOM图像的协同可视化与标注
Pub Date : 2021-09-21 DOI: 10.1109/ICRAMI52622.2021.9585938
Khadidja Belgacem, Mouna Kenoui, Feriel Bouguerra, Mohammed Laidi, Amine Semrani, Celia Sellah
Nowadays, E-health is increasingly used to offer applications that respond to the healthcare professionals’ problems and improve the services provided to their patients. In this work we focus on the visualization and manipulation of medical images by several physicians within the framework of a tele-expertise service. Indeed, such a service allows a local physician to share his patient's medical data with one or more remote medical experts in order to get a second medical opinion to better diagnose and/or treat the patient. The proposed solution in this paper allows collaborative visualization of medical images based on the DICOM standard via a web viewer, the annotations added by the remote physician are synchronized in real-time using WebRTC protocol, allowing a common display for all physicians participating in the tele-expertise session.
如今,电子医疗越来越多地用于提供应用程序,以响应医疗保健专业人员的问题并改善向患者提供的服务。在这项工作中,我们将重点放在几位医生在远程专家服务框架内对医学图像的可视化和操作上。实际上,这种服务允许本地医生与一个或多个远程医疗专家共享患者的医疗数据,以便获得第二种医疗意见,从而更好地诊断和/或治疗患者。本文提出的解决方案允许基于DICOM标准的医学图像的协作可视化,通过web查看器,远程医生添加的注释使用WebRTC协议实时同步,允许所有参加远程专家会议的医生共同显示。
{"title":"Collaborative Visualization and Annotations of DICOM Images for Real-Time Web-based Telemedicine System","authors":"Khadidja Belgacem, Mouna Kenoui, Feriel Bouguerra, Mohammed Laidi, Amine Semrani, Celia Sellah","doi":"10.1109/ICRAMI52622.2021.9585938","DOIUrl":"https://doi.org/10.1109/ICRAMI52622.2021.9585938","url":null,"abstract":"Nowadays, E-health is increasingly used to offer applications that respond to the healthcare professionals’ problems and improve the services provided to their patients. In this work we focus on the visualization and manipulation of medical images by several physicians within the framework of a tele-expertise service. Indeed, such a service allows a local physician to share his patient's medical data with one or more remote medical experts in order to get a second medical opinion to better diagnose and/or treat the patient. The proposed solution in this paper allows collaborative visualization of medical images based on the DICOM standard via a web viewer, the annotations added by the remote physician are synchronized in real-time using WebRTC protocol, allowing a common display for all physicians participating in the tele-expertise session.","PeriodicalId":440750,"journal":{"name":"2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133224945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Maximization of the Stability Radius of an Infinite Dimensional System Subjected to Stochastic Unbounded Structured Multi-perturbations With Unbounded Input Operator 具有无界输入算子的受随机无界结构多重扰动的无限维系统稳定性半径的最大化
Pub Date : 2021-09-21 DOI: 10.1109/ICRAMI52622.2021.9585930
Heddar Amina, Kada Maissa
In this paper we consider infinite dimensional systems subjected to stochastic structured multiperturbations. We address the problem of robustness optimization with respect to state feedback but allow both unbounded input and perturbations. Conditions are derived for the existence of a stabilizing controller ensuring that the norm of the closed loop operator below a prespecified bound. Such controllers will be called suboptimal controllers. The suboptimality conditions are obtained in terms of a Riccati equation which satisfies an operator inequality. Finally, we give a lower bound for the supremal achievable stability radius via the Riccati equation.
本文研究受随机结构多摄动影响的无限维系统。我们解决了关于状态反馈的鲁棒性优化问题,但同时允许无界输入和扰动。导出了闭环算子范数低于预定界的稳定控制器的存在性条件。这样的控制器称为次优控制器。得到了满足算子不等式的Riccati方程的次优性条件。最后,利用Riccati方程给出了最高可达稳定半径的下界。
{"title":"Maximization of the Stability Radius of an Infinite Dimensional System Subjected to Stochastic Unbounded Structured Multi-perturbations With Unbounded Input Operator","authors":"Heddar Amina, Kada Maissa","doi":"10.1109/ICRAMI52622.2021.9585930","DOIUrl":"https://doi.org/10.1109/ICRAMI52622.2021.9585930","url":null,"abstract":"In this paper we consider infinite dimensional systems subjected to stochastic structured multiperturbations. We address the problem of robustness optimization with respect to state feedback but allow both unbounded input and perturbations. Conditions are derived for the existence of a stabilizing controller ensuring that the norm of the closed loop operator below a prespecified bound. Such controllers will be called suboptimal controllers. The suboptimality conditions are obtained in terms of a Riccati equation which satisfies an operator inequality. Finally, we give a lower bound for the supremal achievable stability radius via the Riccati equation.","PeriodicalId":440750,"journal":{"name":"2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128285200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1